Hi [[ session.user.profile.firstName ]]

Protecting identity perimeter of modern enterprises

Come join a discussion on how identity has become the new enterprise perimeter now and learn how to protect it against 95% of all security breaches that often start with compromised identity.
Recorded Jul 19 2017 28 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Shri. P. & Alex Buffington
Presentation preview: Protecting identity perimeter of modern enterprises

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • NIST 800-171 Protect CUI or Risk Losing Federal Business Oct 12 2017 5:00 pm UTC 60 mins
    Kelly Handerhan, CISSP, PMP, CASP, CEH, Cybrary.it SME
    Federal contractors that process, store or transmit what’s called Controlled Unclassified Information have until December to implement new, more stringent security guidelines to protect that information. Chances are your organization already meets some of the requirements, but it’s unlikely that you meet them all. Join us to identify what’s new, what’s not, what you have to do and how to assess the impact.
  • Strategies for CISSP® Exam Aug 24 2017 5:00 pm UTC 60 mins
    Sam Meisenberg, Head of CISSP Training at CyberVista
    Are you considering taking the CISSP exam? The CISSP is considered the industry-leading certification in cybersecurity, but the exam is certainly no cake walk. Strategies for CISSP Exam webinar dissects the structure of the CISSP exam. Hosted by (ISC)2 Approved training provider CyberVista, we will explain the 8 Domains that comprise the test while also providing valuable strategies for test day.
  • CMDSP - Mobile Security for the Mobile IT Administrator Recorded: Aug 10 2017 54 mins
    Ken Lloyd, CMDSP's Board members and CTO for Mi3 Security.
    ITPG Secure Compliance's Cybercast series proudly presents : CMDSP - Mobile Security for the Mobile IT Administrator.

    Come join us for a discussion on the advent of the Mobile IT Administrator position, and how CMDSP is helping organizations improve their enterprise mobility management strategy.

    ITPG Secure Compliance has invited Mr. Ken Lloyd, CMDSP's Board members and CTO for Mi3 Security, a leader in Mobile Application Risk Intelligence and Mobile Threat Defense. With 18 years focused on creating powerful Mobile and Security solutions for Enterprises, SMB's and Consumers. Recognized as a Subject Matter Expert (SME) in Mobile Security, Security Awareness and IT Security.
  • Human Factors in Cyber Security Recorded: Aug 10 2017 74 mins
    Dr. Calvin Nobles
    We discussed Human Factors in Cyber Security. The discourse surrounding human performance in cyber security remains a relevant topic; nevertheless, the scientific underpinning remains deficient. Human error is the primary contributing factor that leads to malicious activity in cyber security. Other domains such as aviation, healthcare, and nuclear power have capitalized on human factors to reduce accidents and to identify critical phases of operations; consequently, the cyber security sector trails behind the above-mentioned industries in leveraging human factors.

    The aim of this presentation is leveraging organizational culture as a platform to address human factors in cyber security. The continuous integration of technology accompanied by (a) advanced persistent threats, (b) ransomware attacks, (c) data breaches, and (d) cyber-attacks increases and threatens the complexity of cyber security operations.

    Included are examples of conceptual processes, models, and frameworks to influence cyber leaders and professionals to mandate the integration of human factors in cyber security.

    Keynote Speaker:
    Dr. Calvin Nobles, Ph.D. is a cyber security subject matter expert (SME), national security leader, researcher, practitioner, and educator with more than 20 years of experience. Culminating a career of military service at the national level in 2017, as a cyber security executive and cyber consultant. He is an adjunct faculty member at the University of Maryland University College and Indian Wesleyan University. Calvin is actively involved in the cyber community, volunteering with multiple professional associations and conducting cyber security research. Calvin is the author of the book, Exploring the Implications of Implementing Technologically Advanced Aircraft in General Aviation.
  • Web Application Testing Recorded: Aug 9 2017 124 mins
    Ben Pick - Coveros
    We discussed Web Application Testing. Web applications provide a vulnerable window into internal enterprises. These applications often process and use poorly validated input. This presentation discusses methodologies to identify and exploit such vulnerabilities within the applications.

    The target audience for this talk ranges from those with limited prior knowledge of web application testing to those with a moderate understanding.

    Keynote Speaker(s):
    Mr. Ben Pick has 8 years of security and development experience including vulnerability assessments of web and mobile applications, analyzing source code for security risks, and configuring architecture to monitor systems for anomalous activities. For the past few years, Ben has worked to incorporate security into DevOps environments by merging security tools within the software development lifecycle. This includes automating static code analysis and vulnerability tools on development environments which act as supplemental resources for manual tests.
  • SOC Analyst Fundamentals Recorded: Aug 4 2017 129 mins
    Tyrone E. Wilson - Founder, and CEO of Cover6 Solutions
    We discuss defensive tools/techniques to understand SOC Analyst fundamentals and why SOC Analysts are so highly sought after with the increasing hacking incidents. When most people hear "hacking", they think of offensive tools and software, but defensive tools play a big part in incident prevention, handling, response/recovery and forensics. This webinar is suitable for both beginners and seasoned professionals.

    Keynote Speaker(s):
    Tyrone E. Wilson - Founder, and CEO of Cover6 Solutions 19 years of experience focusing on Information Systems and Network Security. Wilson has extensive expertise in multiple areas of the cyber field including, but not limited to, network defense, cyber threat analysis, penetration testing/vulnerability assessments, and IPv6. Wilson has a passion and a mission for spreading knowledge to all that he can reach about everything that he’s acquired through his years of experience.

    Candan Bolukbas is digital polymath and Certified Ethical Hacker. Candan fully appreciates the growing threat to digital communications and data accumulation which affects all of us. He is co-founder and chief technology officer for NormShield, Inc., a McLean-based “security-as-a-service solutions” company. Candan and NormShield’s primary focus is on cyber threat intelligence, vulnerability management and perimeter monitoring.
  • Protecting identity perimeter of modern enterprises Recorded: Jul 19 2017 28 mins
    Shri. P. & Alex Buffington
    Come join a discussion on how identity has become the new enterprise perimeter now and learn how to protect it against 95% of all security breaches that often start with compromised identity.
  • Dark Web AI is bringing Dark Web Intelligence to your desktop Recorded: May 18 2017 60 mins
    Ross Everett and Larry Lafferty
    Come join a discussion with two industry leaders in the converging worlds of Dark Web Scanning and Artificial Intelligence. Learn how Intelligent agents can work from your desktop to scan the dark web for your stolen data.
  • Building Your New York State Financial Services Cyber Compliance Plan Recorded: Apr 6 2017 48 mins
    David Kim. ITPG Secure Compliance: Principal Consultant, Governance Risk and Compliance
    The most critical first steps for mid-size banks, financial and insurance firms
  • PCI DSS v3.2. A Fast Assessment to Identify What You Must Do to Comply Recorded: Jan 12 2017 53 mins
    David Kim. ITPG Secure Compliance. SVP, Governance Risk and Compliance
    Your organization has little over a year to comply with the new PCI DSS v3.2 standard. If you have yet to assess your current security controls against these new standards, it’s time to start. We’ll highlight the key changes, the issues to think about, and the time required to assess, plan and implement. As a PCI Qualified Security Assessor, we know what can trip organizations up and how to avoid missteps.
Cybersecurity and Compliance
Founded in 1999, ITPG Secure Compliance is dedicated to preventing information security breaches that put organizations at risk of noncompliance. Based in Vienna, VA, our subject matter experts are sought-after authorities on PCI DSS, HIPAA Security and Privacy Rule, FERPA and other industry security requirements. Our IT security consultants and virtual CISOs have decades of experience assessing security risks and vulnerabilities, recommending mitigation strategies and mapping remediation plans to strengthen enterprise security posture. We work with corporate, association, and state agency clients that span multiple industries and for multiple resellers. Visit our web site www.itpgsecure.com

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Protecting identity perimeter of modern enterprises
  • Live at: Jul 19 2017 5:00 pm
  • Presented by: Shri. P. & Alex Buffington
  • From:
Your email has been sent.
or close